Dynamic encryption system based on all-prime-number library
A dynamic encryption, prime number technology, applied in the field of information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The large encryption module stores a complete full prime number library. If a special prime number is needed during use, the full prime number library is first screened into a special prime number library. When in use, it is divided into two libraries, one is called standard prime number library A, which is used for backup; the other is called residual prime number library B, which is officially used prime number library. When using for the first time, copy B 1 Library = A library, and B 1 The library is added to the B library, that is, the B library = B 1 Library. Every time a prime number is used, a prime number is randomly selected from the B library and the used prime number is deleted. System real-time record B 1 The remaining prime numbers in the library. When B 1 When the remaining primes in the library are less than the specified ratio k%, the second copy B 2 Library = A library, and B 2 The library is added to the B library, that is, the B library = B 1 Library...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com